A wide range of articles, videos and interviews concerning persistent and current threats that organisations face.

Cyber attack Understanding and mitigating the cyber threat to manufacturers

Manufacturers are attractive targets for cyber criminals, competitors and nation state actors. Understanding the nature of the threat they face …

Threat intelligence Threat hunting or threat detection: what’s more important?

Sponsored by IBM
Threat hunting is computationally expensive while threat detection can run in the background. But that’s hardly the full story. Join …

Threat intelligence Determining the landscape of attacks

Sponsored by IBM
“Yet another framework, yet another set of terminologies…” Join us as we discuss cyber security databases and the effectiveness of …

Phishing Counting the cost of cyber-attacks in the pandemic era

As the threat posed to our health posed by COVID-19 increased, so did the number of cyber-attacks targeting notable organisations …

Malware How a new open-source tool can help businesses in the fight against malware

Sponsored by Blackberry
New software from BlackHat makes reverse-engineering malware faster and easier for software engineers. Reverse-engineering of malware is an extremely time- …

Quantum computing How to prepare your organisation for the quantum computing era

Within the next few years a quantum computer will crack encryption. This once in a generation event will, in a …

Third party risk Modernising third-party cyber risk management: whose risk agenda are you trying to satisfy?

Managing third-party cyber security risk in today’s highly connected businesses isn’t easy. Security and risk management teams are pulled in …

Threat intelligence Orchestration with and without intelligence: What’s the difference?

How best to use orchestration and automation in cyber security operations is a question that many CISOs have been asking …

Insider threat Caught in the act: Spotting suspicious user activity with behavioural analytics

User entity behaviour analytics uses behavioural profiling to alert security teams to suspicious behaviour by comparing it to a …

Threat intelligence How to maximise the value of cyber threat intelligence 

Cyber threat intelligence is an important line of defence; however traditional tools have limitations which must be overcome

Cyber crime Mitigating risk and navigating the evolving cyber-threat landscape

Sponsored by eSentire
In a globally connected world, there are few professions not affected by major world events such as an economic recession …

Threats Recursive malvertising

Researchers have uncovered more than a thousand inactive domains that, when visited, redirect the visitors to unwanted URLs as a …